Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 09:17

General

  • Target

    62a90fd38328acfd75eb503ca523411f_JaffaCakes118.pdf

  • Size

    79KB

  • MD5

    62a90fd38328acfd75eb503ca523411f

  • SHA1

    eaea646a7ae2b859a044d6db65220c922c7b50cd

  • SHA256

    d7f6c0bc436addf2183217b2a2c03e8d3f51971a82c48e24097cb657afd0d78b

  • SHA512

    aa4f0a0e2d42e9db04dbcc35c4a2fccee5e6651af512b400fe4a2b4001215ac941b98231d4607ed0fe080d45cdb233167b2bf33654f7326d893c7487105f5975

  • SSDEEP

    384:B3Xd+B5OZc3teJprJmzGv9auuuIuuuuuuuuuuu4uuuuuuuFSFrNuuuIuuuuuuuuo:DH

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\62a90fd38328acfd75eb503ca523411f_JaffaCakes118.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2320-0-0x0000000003490000-0x0000000003506000-memory.dmp

    Filesize

    472KB

  • memory/2320-3-0x0000000000C50000-0x0000000000C51000-memory.dmp

    Filesize

    4KB